Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks

Spoofing attacks pose a serious threat to wireless communications. Exploiting physical-layer features to counter spoofing attacks is a promising solution. Although various physical-layer spoofing attack detection (PL-SAD) techniques have been proposed for conventional 802.11 networks in the sub-6GHz band, the study of PL-SAD for 802.11ad networks in 5G millimeter wave (mmWave) 60GHz band is largely open. In this paper, to achieve efficient PL-SAD in 5G networks, we propose a unique physical layer feature in IEEE 802.11ad networks, i.e., the signal-to-noise-ratio (SNR) trace obtained at the receiver in the sector level sweep (SLS) process. The SNR trace is readily extractable from the off-the-shelf device, and it is dependent on both transmitter location and intrinsic hardware impairment. Therefore, it can be used to achieve an efficient detection no matter the attacker is co-located with the legitimate transmitter or not. To achieve spoofing attack detection, we provide two methods based on different machine learning models. For the first method, the detection problem is formulated as a machine learning classification problem. To tackle the small sample learning and fast model construction challenges, we propose a novel neural network framework consisting of a backpropation network, a forward propagation network, and generative adversarial networks (GANs). Another method involves a Siamese network, in which the similarity between sample pairs from one device is used to achieve PL-SAD. It can tackle the training problem that the historical data cannot support the identification of the same device in a new communication session. We conduct experiments using off-the-shelf 802.11ad devices, Talon AD7200s and MG360, to evaluate the performance of the proposed PL-SAD schemes. Experimental results confirm the effectiveness of the proposed PL-SAD schemes, and the detection accuracy can reach 99% using small sample sizes under different scenarios.

[1]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[2]  Le Song,et al.  Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection , 2018 .

[3]  Edward W. Knightly,et al.  IEEE 802.11ad: directional 60 GHz communication for multi-Gigabit-per-second Wi-Fi [Invited Paper] , 2014, IEEE Communications Magazine.

[4]  Dennis Goeckel,et al.  Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.

[5]  Aydin Behnad,et al.  Performance enhancement of I/Q imbalance based wireless device authentication through collaboration of multiple receivers , 2014, 2014 IEEE International Conference on Communications (ICC).

[6]  Xianbin Wang,et al.  Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.

[7]  Ting Jiang,et al.  Physical layer spoofing detection based on sparse signal processing and fuzzy recognition , 2017, IET Signal Process..

[8]  Dimitrios Koutsonikolas,et al.  Physical Layer Identification Based on Spatial–Temporal Beam Features for Millimeter-Wave Wireless Networks , 2019, IEEE Transactions on Information Forensics and Security.

[9]  Justin Salamon,et al.  Deep Convolutional Neural Networks and Data Augmentation for Environmental Sound Classification , 2016, IEEE Signal Processing Letters.

[10]  Dimitrios Koutsonikolas,et al.  Poster: X60: A Programmable Testbed for Wideband 60 GHz WLANs with Phased Arrays , 2017, MobiCom.

[11]  Ning Wang,et al.  Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.

[12]  Ning Wang,et al.  Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[13]  Ning Wang,et al.  Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities , 2019, IEEE Internet of Things Journal.

[14]  Xianbin Wang,et al.  A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).

[15]  J. Sobana,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .

[16]  Debayan Das,et al.  RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.

[17]  Jörg Widmer,et al.  Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices , 2017, CoNEXT.

[18]  Gary Steri,et al.  A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components , 2017, IEEE Communications Surveys & Tutorials.

[19]  Gilles Roussel,et al.  Syntax tree fingerprinting for source code similarity detection , 2009, 2009 IEEE 17th International Conference on Program Comprehension.

[20]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[21]  Wen-Long Chin,et al.  Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels , 2015, Inf. Sci..

[22]  Michał Grochowski,et al.  Data augmentation for improving deep learning in image classification problem , 2018, 2018 International Interdisciplinary PhD Workshop (IIPhDW).

[23]  Prasant Mohapatra,et al.  Identity-based attack detection in mobile wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[24]  Ning Wang,et al.  Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.

[25]  Shauna Revay,et al.  Deep Learning for RF Device Fingerprinting in Cognitive Communication Networks , 2018, IEEE Journal of Selected Topics in Signal Processing.

[26]  Liang Zhao,et al.  Prediction-time Efficient Classification Using Feature Computational Dependencies , 2018, KDD.

[27]  José M. F. Moura,et al.  A Deep Learning Approach to IoT Authentication , 2018, 2018 IEEE International Conference on Communications (ICC).

[28]  Arnab Roy,et al.  A Tutorial on Beam Management for 3GPP NR at mmWave Frequencies , 2018, IEEE Communications Surveys & Tutorials.

[29]  Narasimhan Sundararajan,et al.  A Fast and Accurate Online Sequential Learning Algorithm for Feedforward Networks , 2006, IEEE Transactions on Neural Networks.

[30]  Sanjay Jha,et al.  DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).